MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a17e2f106640e3451af6faab503fbbc88b7aecb4ac091fc8cb1266dea7f1cdb3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BlackShades


Vendor detections: 16


Intelligence 16 IOCs YARA 18 File information Comments

SHA256 hash: a17e2f106640e3451af6faab503fbbc88b7aecb4ac091fc8cb1266dea7f1cdb3
SHA3-384 hash: dd5b14fe81e394264efe3b8037c1ae00a31334c9a2895f237892e92c10486284d4fe8b4ad7f7338d4893f42cc70a43a3
SHA1 hash: 3de90bc9bb396932564ae4a04ed3f70fda7ffd0f
MD5 hash: 29451405f520af4fe57a7e459fe1ade9
humanhash: hydrogen-october-tennessee-floor
File name:Firefox.exe
Download: download sample
Signature BlackShades
File size:432'128 bytes
First seen:2026-05-17 15:29:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 18aee7cc80e48017bb06b13550617d1d (5 x BlackShades, 1 x BabylonRAT)
ssdeep 12288:YLdcfxaeM6fy/KaVUtgKkTZ73coU5C/y8TBptc:skIZGSAtgN+yl3c
Threatray 50 similar samples on MalwareBazaar
TLSH T12C9412916A809243C4374775C453FB78043B1FEEBBCA9B03D5907FA734A7BC6AA11998
TrID 63.4% (.EXE) UPX compressed Win32 Executable (27066/9/6)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
4.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon 71c08ca696cce071 (2 x BlackShades, 1 x njrat, 1 x MassLogger)
Reporter Anonymous
Tags:babylon BlackShades exe RAT UPX
File size (compressed) :432'128 bytes
File size (de-compressed) :818'176 bytes
Format:win32/pe
Unpacked file: 2f61950c3baa58573fac514205cead5afd6e27e84bb2b91b233a9f045d9b3f4c

Intelligence


File Origin
# of uploads :
1
# of downloads :
127
Origin country :
GB GB
Vendor Threat Intelligence
Malware configuration found for:
BabylonRAT PEPacker
Details
BabylonRAT
c2 socket addresses, a mutex, an interval, network encryption keys, and, if configured, installation parameters
PEPacker
a UPX version number and an unpacked binary
Malware family:
babylon
ID:
1
File name:
Firefox.exe
Verdict:
Malicious activity
Analysis date:
2026-05-17 15:24:14 UTC
Tags:
auto-reg upx babylon rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
downloader dropper remo
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug crypto fingerprint keylogger microsoft_visual_cc overlay packed packed reconnaissance upx
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-05-17T12:28:00Z UTC
Last seen:
2026-05-19T12:12:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.Zonidel.sb Trojan-Spy.Win32.Xegumumune.sbc Trojan-Spy.Win32.Stealer.sb Trojan-Spy.Win32.Larby.sb Trojan-Spy.Win32.KeyLogger.sb Trojan.Win32.Foxhiex.sb Trojan.Win32.Agent.sb Trojan-Dropper.Win32.Dapato.sb HEUR:Trojan.Win32.Generic VHO:Trojan-Spy.Win32.Convagent.gen Trojan-Dropper.Win32.Dorifel.sbd
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.MintZard
Status:
Malicious
First seen:
2026-05-17 15:24:37 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
32 of 36 (88.89%)
Threat level:
  5/5
Gathering data
Unpacked files
SH256 hash:
a17e2f106640e3451af6faab503fbbc88b7aecb4ac091fc8cb1266dea7f1cdb3
MD5 hash:
29451405f520af4fe57a7e459fe1ade9
SHA1 hash:
3de90bc9bb396932564ae4a04ed3f70fda7ffd0f
SH256 hash:
641518539a1318ca172d7727b3a084507dd2400d56d197555879408e6a51a567
MD5 hash:
cdc1829d8994bcb98bd4d76ec7b23440
SHA1 hash:
13eac15b1bc1832b03b1cf5f8b5061e071692ea0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BlackShades_4
Author:Jean-Philippe Teissier / @Jipe_
Description:BlackShades
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_BabylonRAT
Author:ditekSHen
Description:Detects BabylonRAT / CollectorStealer / ParadoxRAT
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
Rule name:win_babylon_rat_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.babylon_rat.
Rule name:win_blackshades_w0
Author:Jean-Philippe Teissier / @Jipe_

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BlackShades

Executable exe a17e2f106640e3451af6faab503fbbc88b7aecb4ac091fc8cb1266dea7f1cdb3

(this sample)

Comments